A federal judge Tuesday dismissed three of six counts in a complaint filed by the U.S. Federal Trade Commission against IoT manufacturer D-Link that alleges its sloppy security practices deceived consumers. The FTC has until Oct. 20 to amend the complaint.

Many recent data breaches, including the Equifax incident, show that "applications are really the vulnerable entry point into organizations and ultimately to organizations' data," says Alex Mosher of CA Technologies.

Equifax has yet to describe how its site was breached, except to blame a vague "U.S. website application vulnerability." But some security experts suspect that an unpatched flaw in Apache Struts, fixed by Apache in March, might have been exploited.

The Singapore arm of AXA Insurance Group says a web application flaw exposed the personal data of thousands of insurance customers to hackers. Experts weigh in on what can be done to prevent such incidents.

Building trust in digital banking is vital as financial fraud can cause customers to easily lose confidence in their financial institutions. Just one cybersecurity incident that results in the compromise of a customer account can drive customers to take their business elsewhere.
Download this whitepaper and...

With customers expecting faster and more convenient services, the challenge isn't just intercepting suspicious transactions, but it's also about enabling legitimate transactions to proceed without interruption. To more effectively assess fraud risk, the ability to view omni-channel account activity in context is...

Your users connect from many locations and devices. They no longer need the VPN to get work done. What if you had a fast, easy way to protect users anywhere they access the internet?
View this report that provides the 1st line of defense against threats on the internet.

A senior Russian government official warned that Moscow will retaliate if the Senate moves to ban the use of Kaspersky Lab software by government agencies. Meanwhile, CEO Eugene Kaspersky has repeated his offer to allow U.S. officials to review the company's source code.

How do you identify bots that interact with your web applications and sites, and distinguish between good and bad bot activity. Download this infographic to get the basics of bot management - what works and what doesn't.
Learn more about:
What Are Bots?
4 Common Harmful Bot Impacts
Blocking Bots Doesn't...

Bots come in all varieties. How do you identify bots that interact with your web applications and sites, and distinguish between good and bad bot activity. Download this infographic to get the basics of bot management - what works and what doesn't.
Learn more about:
What Are Bots?
4 Common Harmful Bot...

Bots come in all varieties. How do you identify bots that interact with your web applications and sites, and distinguish between good and bad bot activity. Download this infographic to get the basics of bot management - what works and what doesn't.
Learn more about:
What Are Bots?
4 Common Harmful Bot...

Security teams safeguarding web applications deal with a lot: delivering security capabilities that integrate into a living, breathing software organization that can cope with determined attackers, and that can scale to meet the needs of the enterprise in the future.
This whitepaper will teach you everything you...